1-Trojan horses can spread by ________. e-mailing themselves to victim computers
ID: 3602274 • Letter: 1
Question
1-Trojan horses can spread by ________.
e-mailing themselves to victim computers
directly propagating to victim computers
both A and B
neither A nor B
2-A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.
security error
vulnerability
security fault
malware
3-A program that can capture passwords as you enter them is ________.
a keystroke logger
data mining software
both A and B
neither A nor B
4-The Target attackers sold their stolen card information to ________.
crimeware shops
card counterfeiters
card shops
Hallmark
5-The general name for evil software is ________.
virus
exploit
worm
malware
6-Which of the following attach themselves to other programs?
Viruses
Worms
both A and B
neither A nor B
7-Vulnerability-based attacks that occur before a patch is available are called ________ attacks.
stealth
zero-day
preinstallation
malware
8-Which of the following can spread more rapidly?
directly-propagating worms
directly-propagating viruses
Both of the above can spread with approximately equal speed.
9-Which of the following probably suffered the most financial damage from the Target breach?
Target
consumers
POS vendors
banks
10-Malware programs that masquerade as system files are called ________.
scripts
payloads
Trojan horses
viruses
e-mailing themselves to victim computers
directly propagating to victim computers
both A and B
neither A nor B
Explanation / Answer
Answer:-
1) neither A nor B
2) vulnerability
3) a keystroke logger
4) card shops
5) malware
6) Viruses
7) zero-day
8) directly-propagating worms
9) Target
10) Trojan horses
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.